
Summary
This detection rule targets potentially malicious activity involving child processes spawned by `conhost.exe`, a legitimate Windows utility that serves as a host for console applications. The rule is applicable in environments where process creation can provide insights into suspicious behavior, particularly when trusted system components like `conhost.exe` invoke child processes such as `cmd.exe`, `powershell.exe`, and others typically associated with scripts or command-line tasks. By monitoring the creation of child processes specifically tied to `conhost.exe`, the rule aims to identify scenarios indicative of malicious software employing evasion techniques by exploiting legitimate system processes, commonly utilized for executing further commands or scripts post-infection. Detecting these patterns can potentially reveal ongoing attack activities or post-exploitation scenarios.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Logon Session
Created: 2025-02-05